Transient Analysis of Cyber-Attacks on Power SCADA using RTDS

##plugins.themes.academic_pro.article.main##

Abhiram Amaraneni
Mahendra Lagineni
Rajesh Kalluri
R. K. Senthilkumar
G. L. Ganga Prasad

Abstract

Cyber security in the SCADA domain has become one of the major concerns of all the stakeholders in the energy sector. The SCADA architecture that the power industry adopts is drawing more attention from a dedicated cyber attacker due to the extent of damage a catastrophe can promise. The usage of open standard protocols for communication among SCADA components that are not designed with security in mind is one of those vulnerable areas for any attacker. The SCADA components in the control region viz., the MTU and the RTU communicate via these insecurely designed open protocols without any authentication. An attacker can target this communication; launch an attack like the manin- the-middle attack resulting in a disastrous situation. An experiment was conducted at CPRI using their Real Time Digital Simulator (RTDS) simulating a substation to study the impact of an attack. This paper brings out the details of the experiment conducted and the results thus obtained.

##plugins.themes.academic_pro.article.details##

How to Cite
Amaraneni, A., Lagineni, M., Kalluri, R., Senthilkumar, R. K., & Ganga Prasad, G. L. (2015). Transient Analysis of Cyber-Attacks on Power SCADA using RTDS. Power Research - A Journal of CPRI, 79–92. Retrieved from https://node6473.myfcloud.com/~geosocin/CPRI/index.php/pr/article/view/748

References

  1. Practical SCADA for Industry by David Bailey, Edwin Wright(pages 11 -17)
  2. Soumitra K. Ghosh, "Changing Role of SCADA in Manufacturing Plan" Industry Applications Conference 31st lAS Annual Meeting, lAS '96, 1999.
  3. Practical Modern SCADA Protocols:DNP3, 60870.5 and Related Systems. By Gordon Clarke, Deon Reynders (pages 17 -35
  4. Practical Modern SCADA Protocols:DNP3, 60870.5 and Related Systems. By Gordon Clarke, Deon Reynders (pages 46 -48)
  5. Dong-Joo Kang l, Hak-Man Kim, “Development of Test-bed and Security Devices for SCADA Communication in Electric Power System”, 'Korea Electrotechnology Research Institute, Incheon CityCollege.
  6. IEC standard for IEC 60870-5-101 protocol titled “Telecontrol equipment and systems - Part 5-101: Transmission protocols Companion standard for basic telecontrol tasks”.
  7. IEC standard for IEC 60870-5-104 protocol titled “Telecontrol equipment and systems - Part 5-104: Transmission protocols Network access for IEC 60870-5-101 using standard transport profiles”.
  8. Durga Samanth P, Rajesh Kalluri, Senthil Kumar R K., Bindhumadhava B.S.,“SCADA Communication Protocols: Vulnerabilities, Attacks and Possible Mitigations”, published in Journal, CSITransactions on ICT, June 2013, Volume 1, Issue 2 (pages 135-141).
  9. http://www.cert.org/information-for/ denial_of_service.cfm?
  10. https://www.classle.net/content-page/ connection-hijacking
  11. John T Hagen and Barry E. Mullins, “TCP veto: A novel network attack and its Application to SCADA protocols”, published in Innovative Smart Grid Technologies (ISGT), 2013 IEEE PES.
  12. IEC standard – IEC 62351-5 titled “Power systems management and associated information exchange - Data and communications security - Part 5: Security for IEC 60870-5 and derivatives”.

Most read articles by the same author(s)